Skip to main content
Top

2020 | OriginalPaper | Chapter

4. Data-Driven Defense Through Leakage Minimization

Authors : Sujit Rokka Chhetri, Mohammad Abdullah Al Faruque

Published in: Data-Driven Modeling of Cyber-Physical Systems using Side-Channel Analysis

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In Part I of this book, we presented data-driven attack models capable of breaching the confidentiality of the system. In this form of attacks, attackers utilize the side-channels (such as acoustics, power, electromagnetic emissions, and so on) in the physical domain to estimate and steal cyber-domain data (such as G/M-codes). Since these emissions depend on the physical structure of the system, one way to minimize the information leakage is to modify the physical domain. However, this process can be costly due to added hardware modification. Instead, in this chapter we present a novel methodology that allows the cyber-domain tools [such as computer-aided manufacturing (CAM)] to be aware of the existing information leakage. We will demonstrate how by changing either machine process or product design parameters in the cyber-domain, we can minimize the information leakage. The methodology presented in this chapter aids the existing cyber-domain and physical domain security solution by utilizing the cross-domain relationship.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hojjati, A., Adhikari, A., et al. (2016) Leave your phone at the door: Side channels that reveal factory floor secrets. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM. Hojjati, A., Adhikari, A., et al. (2016) Leave your phone at the door: Side channels that reveal factory floor secrets. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM.
2.
go back to reference Al Faruque, M. A., Chhetri, S. R., et al. (2016). Acoustic side-channel attacks on additive manufacturing systems. In International Conference on Cyber-Physical Systems (ICCPS). Piscataway: IEEE. Al Faruque, M. A., Chhetri, S. R., et al. (2016). Acoustic side-channel attacks on additive manufacturing systems. In International Conference on Cyber-Physical Systems (ICCPS). Piscataway: IEEE.
3.
go back to reference Chhetri, S. R., et al. (2017). Confidentiality breach through acoustic side-channel in cyber-physical additive manufacturing systems. ACM Transaction on Cyber-Physical Systems, 2(1), 3MathSciNet Chhetri, S. R., et al. (2017). Confidentiality breach through acoustic side-channel in cyber-physical additive manufacturing systems. ACM Transaction on Cyber-Physical Systems, 2(1), 3MathSciNet
4.
go back to reference Yampolskiy, M., Andel, T. R., et al. (2014). Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop. New York: ACM. Yampolskiy, M., Andel, T. R., et al. (2014). Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop. New York: ACM.
5.
go back to reference Straub, J. (2017). Identifying positioning-based attacks against 3D printed objects and the 3D printing process. In SPIE Defense+ Security. International Society for Optics and Photonics. Straub, J. (2017). Identifying positioning-based attacks against 3D printed objects and the 3D printing process. In SPIE Defense+ Security. International Society for Optics and Photonics.
6.
go back to reference Chhetri, S. R., Canedo, A., & Al Faruque, M. A. (2016). KCAD: Kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. In Proceedings of the 35th International Conference on Computer-Aided Design. New York: ACM. Chhetri, S. R., Canedo, A., & Al Faruque, M. A. (2016). KCAD: Kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. In Proceedings of the 35th International Conference on Computer-Aided Design. New York: ACM.
7.
go back to reference Belikovetsky, S., Solewicz, Y., et al. (2017). Detecting cyber-physical attacks in additive manufacturing using digital audio signing. arXiv preprint:1705.06454. Belikovetsky, S., Solewicz, Y., et al. (2017). Detecting cyber-physical attacks in additive manufacturing using digital audio signing. arXiv preprint:1705.06454.
8.
go back to reference Tsoutsos, N. G., Gamil, H., & Maniatakos, M. (2017). Secure 3D printing: Reconstructing and validating solid geometries using toolpath reverse engineering. In Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security. New York: ACM. Tsoutsos, N. G., Gamil, H., & Maniatakos, M. (2017). Secure 3D printing: Reconstructing and validating solid geometries using toolpath reverse engineering. In Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security. New York: ACM.
10.
go back to reference Chen, F., Mac, G., & Gupta, N. (2017). Security features embedded in computer aided design (CAD) solid models for additive manufacturing. Materials & Design, 128, 182–194.CrossRef Chen, F., Mac, G., & Gupta, N. (2017). Security features embedded in computer aided design (CAD) solid models for additive manufacturing. Materials & Design, 128, 182–194.CrossRef
11.
go back to reference Gupta, N., Chen, F., et al. (2017). ObfusCADe: Obfuscating additive manufacturing CAD models against counterfeiting. In Proceedings of the 54th Annual Design Automation Conference 2017. New York: ACM. Gupta, N., Chen, F., et al. (2017). ObfusCADe: Obfuscating additive manufacturing CAD models against counterfeiting. In Proceedings of the 54th Annual Design Automation Conference 2017. New York: ACM.
13.
go back to reference Jamieson, R., & Hacker, H. (1995). Direct slicing of CAD models for rapid prototyping. Rapid Prototyping Journal, 1(2), 4–12.CrossRef Jamieson, R., & Hacker, H. (1995). Direct slicing of CAD models for rapid prototyping. Rapid Prototyping Journal, 1(2), 4–12.CrossRef
14.
go back to reference Jin, G. Q., Li, W. D., et al. (2011). Adaptive tool-path generation of rapid prototyping for complex product models. Journal of manufacturing systems, 30(3), 154–164.CrossRef Jin, G. Q., Li, W. D., et al. (2011). Adaptive tool-path generation of rapid prototyping for complex product models. Journal of manufacturing systems, 30(3), 154–164.CrossRef
15.
go back to reference Yang, W., Zhou, Y., et al. (2017). Multi-channel fusion attacks. IEEE Transactions on Information Forensics and Security, 12(8), 1757–1771.CrossRef Yang, W., Zhou, Y., et al. (2017). Multi-channel fusion attacks. IEEE Transactions on Information Forensics and Security, 12(8), 1757–1771.CrossRef
16.
go back to reference Mativo, T., Fritz, C., & Fidan, I. (2018). Cyber acoustic analysis of additively manufactured objects. The International Journal of Advanced Manufacturing Technology, 96(1–4), 581–586.CrossRef Mativo, T., Fritz, C., & Fidan, I. (2018). Cyber acoustic analysis of additively manufactured objects. The International Journal of Advanced Manufacturing Technology, 96(1–4), 581–586.CrossRef
17.
go back to reference Veyrat-Charvillon, N., & Standaert, F.-X. (2009). Mutual information analysis: How, when and why?. In CHES (Vol. 5747, pp. 429–443). Berlin: Springer. Veyrat-Charvillon, N., & Standaert, F.-X. (2009). Mutual information analysis: How, when and why?. In CHES (Vol. 5747, pp. 429–443). Berlin: Springer.
18.
go back to reference Chhetri, S. R., Faezi, S., & Al Faruque, M. A. (2017). Fix the leak! an information leakage aware secured cyber-physical manufacturing system. In 2017 Design, Automation and Test in Europe Conference and Exhibition (DATE). Piscataway: IEEE. Chhetri, S. R., Faezi, S., & Al Faruque, M. A. (2017). Fix the leak! an information leakage aware secured cyber-physical manufacturing system. In 2017 Design, Automation and Test in Europe Conference and Exhibition (DATE). Piscataway: IEEE.
19.
go back to reference Kramer, T. R., Proctor, F. M., et al. (2000). The NIST RS274NGC interpreter-version 3 (Vol. 5416). NISTIR. Kramer, T. R., Proctor, F. M., et al. (2000). The NIST RS274NGC interpreter-version 3 (Vol. 5416). NISTIR.
21.
go back to reference Drumm, B. (2011). Printrbot: Your first 3D printer. Retrieved November, 26 (2013). Drumm, B. (2011). Printrbot: Your first 3D printer. Retrieved November, 26 (2013).
22.
go back to reference AT2021 (2016). Cardioid Condenser Microphone. Audio-Technica. AT2021 (2016). Cardioid Condenser Microphone. Audio-Technica.
Metadata
Title
Data-Driven Defense Through Leakage Minimization
Authors
Sujit Rokka Chhetri
Mohammad Abdullah Al Faruque
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-37962-9_4